Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being…mehr
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.
Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Ruben Rios is a post-doc researcher at the NICS Lab, which is part of the Computer Science Department at the University of Malaga, in Spain. He holds a Cum Laude Ph.D. in Computer Science from the same university, where he also obtained the MS in Computer Engineering. Before that, he studied at the University of Skövde in Sweden, where he obtained a BSc in Computer Science. He has been involved in the scientific committee of numerous conferences and served as a reviewer for multiple journals. Recently he joined the Editorial Board of the International Journal Of Computer and Software Engineering. He also has published a number of papers in top security-related conferences and journals with impact factor. He has been actively involved in several national and EU funded projects. His research interests cover various fields related to information security, being particularly interested in enabling privacy in resource-constrained devices, like smartphones, sensor networks, and the Internet of Things.
Javier Lopez is Full Professor at the University of Malaga. His research activities are mainly focused on network security, security protocols and critical information infrastructures, leading a number of national and international research projects in those areas, including projects in FP5, FP6 and FP7 European Programmes. Prof. Lopez is the Spanish representative in the IFIP Technical Committee 11 on Security and Protection in Information Systems, Co-Editor in Chief of International Journal of Information Security (IJIS), and a member of the Editorial Boards of, amongst others, IEEE Wireless Communications, Computers & Security, IEEE Internet of Things Journal, Journal of Computer Security, IET Information Security, and International Journal on Critical Infrastructure Protection. In the past, he has been Chair of the IFIP Working Group 11.11 on Trust Management and Chair of the ERCIM Working Group on Security and Trust Management.
Jorge Cuellar is a principal consultant at Siemens AG. He was awarded the DI-ST Award for the best technical achievement for his work on modelling of operating systems and transaction managers. He has co-authored about 30 papers on different topics, including formal specification and verification of distributed system design, and security. He has done technical standardization work, related to the development of privacy and security protocols at the IETF, 3GPP, and the Open Mobile Alliance. He has 16 inventions and patents. He has worked in several EU funded research projects, in particular in AVISPA and AVANTSSAR, both related to the formal modelling and verification of security and currently in NESSoS, WebSand, and SPACIoS. He has served as the PC Co-chair of Software Engineering and Formal Methods (SEFM) in 2004, Formal Methods (FM '08) in 2008, and STM '10 and in the steering committee of ESSoS. He has presented more than 20 invited talks at conferences and seminars, and acts regularly as a reviewer for international conferences and journals. He has been in the editorial board of Journal of Science of Computer Programming-Elsevier. He is a member of the Industrial Curatory Board of Dagstuhl, Leibniz Center for Informatics, the world's premier venue for informatics.
Inhaltsangabe
Introduction. Suitability of Computer-based Anonymity Systems. Analysis of Location Privacy Solution. Context-Aware Source-Location Privacy. Probabilistic Receiver-Location Privacy. Conclusion.